| Publication | Date of Publication | Type |
|---|
Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves Commentarii Mathematici Universitatis Sancti Pauli | 2024-11-13 | Paper |
Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH} Designs, Codes and Cryptography | 2024-10-14 | Paper |
Compact FE for unbounded attribute-weighted sums for logspace from SXDH Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
| Counting superspecial Richelot isogenies by reduced automorphism groups | 2022-11-25 | Paper |
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems Information Security and Cryptology | 2022-10-14 | Paper |
| Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence | 2022-10-07 | Paper |
| An efficient authenticated key exchange from random self-reducibility on CSIDH | 2022-03-24 | Paper |
| Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves | 2021-08-16 | Paper |
Improved supersingularity testing of elliptic curves JSIAM Letters | 2021-07-05 | Paper |
Counting Richelot isogenies between superspecial abelian surfaces Open Book Series | 2021-03-11 | Paper |
Post-Quantum Constant-Round Group Key Exchange from Static Assumptions International Symposium on Mathematics, Quantum Theory, and Cryptography | 2021-02-25 | Paper |
Unbounded inner product functional encryption from bilinear maps Japan Journal of Industrial and Applied Mathematics | 2021-02-15 | Paper |
| Efficient attribute-based signatures for unbounded arithmetic branching programs | 2020-01-28 | Paper |
| One-round authenticated group key exchange from isogenies | 2020-01-10 | Paper |
Fully secure functional encryption with a large class of relations from the decisional linear assumption Journal of Cryptology | 2019-11-27 | Paper |
| Supersingular isogeny Diffie-Hellman authenticated key exchange | 2019-03-29 | Paper |
| New assumptions on isogenous pairing groups with applications to attribute-based encryption | 2019-03-29 | Paper |
Constructing an efficient hash function from \(3\)-isogenies JSIAM Letters | 2019-03-18 | Paper |
Heuristic counting of Kachisa-Schaefer-Scott curves JSIAM Letters | 2019-03-18 | Paper |
| Adaptively simulation-secure attribute-hiding predicate encryption | 2019-01-23 | Paper |
Unbounded inner product functional encryption from bilinear maps Lecture Notes in Computer Science | 2019-01-23 | Paper |
| New proof techniques for DLIN-based adaptively secure attribute-based encryption | 2017-08-25 | Paper |
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders Provable Security | 2016-01-27 | Paper |
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption Designs, Codes and Cryptography | 2015-10-26 | Paper |
Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption Lecture Notes in Computer Science | 2014-10-14 | Paper |
Predicate- and attribute-hiding inner product encryption in a public key setting Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Decentralized attribute-based signatures Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Fully secure unbounded inner-product and attribute-based encryption Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption Cryptology and Network Security | 2012-07-20 | Paper |
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Some key techniques on pairing vector spaces Lecture Notes in Computer Science | 2011-06-29 | Paper |
Efficient attribute-based signatures for non-monotone predicates in the standard model Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Fully secure functional encryption with general relations from the decisional linear assumption Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Hierarchical Predicate Encryption for Inner-Products Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
AN ALGORITHM FOR COMPUTING A SEQUENCE OF RICHELOT ISOGENIES Bulletin of the Korean Mathematical Society | 2009-08-06 | Paper |
Homomorphic Encryption and Signatures from Vector Decomposition Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
Efficiently Computable Distortion Maps for Supersingular Curves Lecture Notes in Computer Science | 2008-05-27 | Paper |
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method Lecture Notes in Computer Science | 2008-03-17 | Paper |